Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
09-12-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd.apk
-
Size
2.1MB
-
MD5
bcbbc445f93288c19ee9168e803b9fca
-
SHA1
4f46109b43f033cdafa44a8fb79c77c94385a01b
-
SHA256
48bc5e8f778f01f8b1bd5c6bf034d4c50675c98318af50ecb852f7d8e078c9fd
-
SHA512
b45d5fcb6ad893c75eb81b887e7409c38da50c7d602ab7ebb2f269f53bacfb33d9cda61d0eecead6cfbef24dbca982591d6f658f5340fe0c32e388b88587f382
-
SSDEEP
49152:aRMHwtPg6fDR3cZWllX8L/MTrYwUYSSV9JDriLmUk97zC+su:a2HwtPg+DR3cZOqrirYwK2i6vr
Malware Config
Extracted
octo
https://oelikixanni14.live/MTU2OWE0NzJjNGY5/
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
Extracted
octo
https://oelikixanni14.live/MTU2OWE0NzJjNGY5/
https://r85d4kbe5729.vip/MTU2OWE0NzJjNGY5/
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.beenor9/app_DynamicOptDex/qslSt.json 4586 com.beenor9 /data/user/0/com.beenor9/cache/udpoedrlmdg 4586 com.beenor9 /data/user/0/com.beenor9/cache/udpoedrlmdg 4586 com.beenor9 -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.beenor9 Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.beenor9 -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.beenor9 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.beenor9 -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.beenor9 -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beenor9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beenor9 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.beenor9 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.beenor9 -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.beenor9 -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.beenor9 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.beenor9 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.beenor9 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.beenor9
Processes
-
com.beenor91⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4586
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e263fd0f2ef46826a192fbe917fec274
SHA180282e8a3d6536c8886e7e0ec127ba026359aba7
SHA25650975688ddb8694cd892ffcb95a7136fdc579fb4ca3d83ae80ad6b16476ab92f
SHA512dbabb1ecfc026d95fd8c7cd40f94fd7656a19ff30ae5cffdf4cbd9781e550128a13b4685167d0cace12268947e9896eda819b006706387a6cd9bc293da5477b8
-
Filesize
1KB
MD59ef9efec94da15686f21b9e762448436
SHA10ab8258c19de715b99e397982da89e4c79389acf
SHA256dce6560176580e23157648b4aa48a9fd0ebee192f0cb91bd11c112e8ef90a1d3
SHA512c8ca0acc808d6df6b921b847a47ba6e05bc4de55bd26d3c8ddc5d70b26c10d0099ba72d48647ac7c498f2ad3d6764bb8099f0813085b89dd639f112f929c5718
-
Filesize
2KB
MD55ce227788ace57daa5125c682d9abf36
SHA179d30d4ea7d18631f2bb3c0bce586b4535da518b
SHA2567c1beae38eecd8c517813c8576336070dbbf41eb216f451d92868d61f82efe65
SHA512774b9c574ee260f73cd72d615ff9f0667a25c0fdca91a6bd9c91a9c2bb4946e121edd4cf0591fbcd48f1ab32ae23b68adaf545e3f9b47b1adbd47fc9a1a0b1be
-
Filesize
343B
MD594ccea83674f2ffd71d93a505cffa4f9
SHA15aa4d484103cda57d3f6a64c25767814254844b1
SHA2569d3065d2fade1359763c623002d9f65dd8fa3f123c0660704b86ae8a2f136452
SHA51262620beefdffda9bb7dab7b945af3188879260d36300b52507ea17a2da35383184b72171c5dd9ebde975dd1410da52fd927da7c53b5a02fa76f209f806b53667
-
Filesize
456KB
MD56354448ad1cc09668325701ddddac014
SHA1dbfc987e0921dc0285e3f59798d379eb60bd2947
SHA2560a11b12265b2ebfc042f4adf4cb85f9b80f3416be21d314e99ee6bcd52e3203e
SHA51275ac094323ba576ae57cb67847f900af2b63420c4f6e27d4733230c52f5df6ae143c3bf1642fc09b9931d3ded17a83b57040cabd4ded7b95183274bac0f63661
-
Filesize
466B
MD556c09d2bf717f86de02dabd20a1b785f
SHA13e87075ab26bb9383ca6403dde4fbfa2a8b23cad
SHA2560e7968e7dfb0b81f7e7761785b8bc6352ecb0d209892c4de257254a590a41a34
SHA512a32c692874ca20258c6ccf787bda8b368115cd9f4dfe668c048fcd44aad93bb20f764d2266b1184c33cbe33e604e1a083d1d5bbd4f1ec70ab2e47371d947a924
-
Filesize
28B
MD56311c3fd15588bb5c126e6c28ff5fffe
SHA1ce81d136fce31779f4dd62e20bdaf99c91e2fc57
SHA2568b82f6032e29a2b5c96031a3630fb6173d12ff0295bc20bb21b877d08f0812d8
SHA5122975fe2e94b6a8adc9cfc1a865ad113772b54572883a537b02a16dd2d029c0f7d9cca3b154fd849bdfe978e18b396bcf9fa6e67e7c61f92bdc089a29a9c355c6
-
Filesize
230B
MD5dfc981daf1a9b2aa9bd2b507481d8eb3
SHA1e574b71c6d55de77fb5812d7eb2f4ba40aeaef2c
SHA25667ce717761553d54a53f41d67aa7ee713ddf0c4530c25c69a28241cc338b0dcb
SHA512cc9ba97de88f79e329c0b0b54698907cd6a5870feb48c026cb92a99bdc63a073d0db3bf28e488c2c750a3d781e45a17b1642073a5a2366306a39dd7d6db1d08b
-
Filesize
63B
MD55521cd75586291a0c8a9b02a505d1781
SHA1da73377db94bb7f4e971e9883b6a2736c8faba8a
SHA256bc0472aff6fe8562a5e8ec478d2e8bb27e05d1defd18d12affdd26b5a141e067
SHA5120f747adde826f564506e0fa5482d03616f5aa773bf6ecfe54581fed5fe526b01c1dae48f3ca93b70a3c5804056b78e6b241162f8939ecf3eb919064a135d702b
-
Filesize
45B
MD5712a23a069bb037d6ab4939430e590f1
SHA1a87e79bd9f54df762b02d1997f605770faa68384
SHA2560e629b83257c7add90156a01900a89c7f4caf000e8b5340a5d3c963e3be28203
SHA512fc82c15a0f83408894c552b3cbe5ddb59097f05ebdfcacc30c972257fc541b5d61302f7f00192fbd24aab39bbef6e4a0ce77e75b1897aab179d4643e603d9dc7